Skip to main content

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem

Recommended For You

Loading...

Computer Security eBooks

If you like Computer Security eBooks, then you'll love these top picks.
Showing 1 - 24 of 6549 Results
Skip side bar filters
  • Security of Networks and Services in an All-Connected World

    11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings

    Series Book 10356 - Lecture Notes in Computer Science
    This book is open access under a CC BY 4.0 license.This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in ... Read more

    Free

  • Electronic Voting

    7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings

    Series Book 13553 - Lecture Notes in Computer Science
    This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions.The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and ... Read more

    Free

  • GDPR and Biobanking

    Individual Rights, Public Interest and Research Regulation across Europe

    Series Book 43 - Law, Governance and Technology Series
    This open access book focuses on the discrepancies in biobank research regulations that are among the most significant hurdles to effective research collaboration. The General Data Protection Regulation (GDPR) has established stringent requirements for the processing of health and genetic data, while simultaneously allowing considerable multi-level exceptions for the purposes of scientific ... Read more

    Free

  • Sicurezza informatica. 10 cose da non fare mai

    Per molte persone, Internet è un’entità virtuale, e virtuale è tutto ciò che su Internet viene fatto. In realtà, da molto tempo non è più così. Internet è strettamente legata alla vita reale della maggior parte di noi. Il conto corrente bancario che controlliamo dal PC non è virtuale, sono soldi veri, che abbiamo guadagnato. Se compriamo qualcosa on line, il denaro viene preso dalla nostra carta ... Read more

    Free

  • Online Safety: Scams, SPAM, Viruses and Clouds

    by A. M. Perry ...
    Have you ever received a phone call informing you that you have a virus on your computer, or a slow Internet connection? Have you ever wondered why you get so much SPAM? Are you concerned your computer might end up with a virus and you'll lose all your files? Does anyone know what the Cloud actually is?This guide has been complied by the local and online community in an attempt to answer some of ... Read more

    Free

  • Rational Cybersecurity for Business

    The Security Leaders' Guide to Business Alignment

    by Dan Blum ...
    Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team.Misalignment ... Read more

    Free

  • The Future and Opportunities of Cybersecurity in the Workforce

    "Every 39 seconds, hackers attack a server or network somewhere. And by 2020, the estimated per data breach will cost more than $150 million."These basic cybersecurity statistics should alarm everyone.With those stats in mind, people should understand the internet is never fully safe. Everything can be hacked, and the few safe spots on the internet are kept that way thanks to teams of ... Read more

    Free

  • Free Is Bad TLDR

    by John Marshall ...
    Ad tech pays for everything that’s free online. Email, search, games, news, entertainment. It’s caused countless problems and we just want a way out of the mess.In just 80 pages this book contains the essential knowledge to understand the problem, and fix your own online life. The original Free Is Bad contains more detailed explanations of the history and business decisions made by the tech giants ... Read more

    Free

  • Easy Password Creation Systems For Life (Introduction)

    Series series Easy Password Creation Systems For Life
    Let's create our own password system which can be used anywhere for all of the passwords we will ever need. We want to make them easy to formulate yet be secure enough.The grid system that you finally choose can easily be recreated any time you like on a piece of paper. You will need to take that piece of paper everywhere you go but you can keep it in your wallet, purse etc. Even if it is exposed ... Read more

    Free

  • Cybersecurity

    Public Sector Threats and Responses

    Edited by Kim J. Andreasson ...
    Series series Public Administration and Public Policy
    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends ... Read more

    Free

  • Security of Ubiquitous Computing Systems

    Selected Topics

    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment ... Read more

    Free

  • Defense against the Black Arts

    How Hackers Do What They Do and How to Protect against It

    Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers ... Read more

    Free

  • Cyber Security

    18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers

    Series Book 1506 - Communications in Computer and Information Science
    This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021.The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: data security; privacy protection; anomaly detection; traffic analysis; ... Read more

    Free

  • The Huawei and Snowden Questions

    Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?

    by Olav Lysne ...
    Series Book 4 - Simula SpringerBriefs on Computing
    This open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these ... Read more

    Free

  • Silicon Valley Cybersecurity Conference

    Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers

    Series Book 1683 - Communications in Computer and Information Science
    This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022.The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote ... Read more

    Free

  • Perspectives on Digital Humanism

    This open access book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by selected thinkers from a variety of disciplines, including computer science, philosophy, education, law, economics, history, anthropology, political science, and sociology. This initiative emerged from the Vienna Manifesto on Digital Humanism and the associated ... Read more

    Free

  • Information Security Governance Simplified

    From the Boardroom to the Keyboard

    Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information is ... Read more

    Free

  • A Best Practices Guide for Comprehensive Employee Awareness Programs

    by MediaPro ...
    With 20-plus years in the adult learning and employee awareness business, MediaPro has ample experience in helping organizations teach their employees. In this guide, we’ve tapped some of our best talent to explain some time-tested best practices for running employee awareness programs in cybersecurity and privacy. We believe that if you’re going to really change behavior within your organization, ... Read more

    Free

  • Internet of Things and the Law

    Legal Strategies for Consumer-Centric Smart Technologies

    Series series Routledge Research in the Law of Emerging Technologies
    Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power – and the increasing significance of their disembodied counterparts – has been the subject of much legal research. For some time now, legal ... Read more

    Free

  • Security in Computer and Information Sciences

    First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers

    Series Book 821 - Communications in Computer and Information Science
    This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has ... Read more

    Free

  • Handbook of Vascular Biometrics

    Series series Advances in Computer Vision and Pattern Recognition
    This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open ... Read more

    Free

  • Cyber Security

    15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers

    Series Book 970 - Communications in Computer and Information Science
    This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence ... Read more

    Free

  • The Future of Financial Systems in the Digital Age

    Perspectives from Europe and Japan

    Series series Perspectives in Law, Business and Innovation
    This book is open access, which means that you have free and unlimited access.The increasing capacity of digital networks and computing power, together with the resulting connectivity and availability of “big data”, are impacting financial systems worldwide with rapidly advancing deep-learning algorithms and distributed ledger technologies. They transform the structure and performance of financial ... Read more

    Free